The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
MU-MIMO beamforming offers great potential for the AP with multiple antennas to serve multiple receivers concurrently. A key factor to implement the MU-MIMO system is the CSI feedback mechanism. However, it might be exploited by malicious attackers to threaten the transmission security of benign clients. To better explore the attacks through false CSI feedback in MU-MIMO systems, this paper proposes...
The covert communication in the physical layer and WiFi network is an important tendency for the current research on covert channel. On the other hand, the MIMO beamforming technique used in the physical layer of WiFi networks provides great potential for developing covert transmission scheme. To fill this gap, this paper presents a novel covert channel based on the coordinated operations in the control...
CSI fingerprint localization is an advanced and promising technique for indoor localization, which identifies the user's location by mapping his measured CSI against the server's CSI fingerprint database. This approach is highlighted due to its high granularity for location distinction and strong robustness to noise disturbances, but it also causes potential privacy leakage for the three participants...
Wireless link signature is a physical layer authentication mechanism, which uses the unique wireless channel characteristics between a transmitter and a receiver to provide authentication of wireless channels. A vulnerability of existing link signature schemes has been identified by introducing a new attack, called mimicry attack. To defend against the mimicry attack, we propose a novel construction...
To address the increasing demand for wireless bandwidth, cognitive radio networks (CRNs) have been proposed to increase the efficiency of channel utilization; they enable the sharing of channels among secondary (unlicensed) and primary (licensed) users on a non-interference basis. A secondary user in a CRN should constantly monitor for the presence of a primary user's signal to avoid interfering with...
Clustering Concept Hierarchies is the most important and basic procedure among the tasks of Ontology Construction to organize the knowledge. This paper proposes a method for concept hierarchies induction based on FCA from a list of concepts. In our method, the feature space is specified to be the attributes of the concept. Thus the feature extraction can be turned into the extraction of attribute...
In this paper, we propose some machine learning techniques for the acquisition of subcategorization frames (SCFs) information from parsed corpora for Chinese. A smoothing algorithm is used in order to minimize mistake caused by falsely parsing. Our algorithm is based on Support Vector Machines to filter improper SCFs extracted from low quality corpora parsed by dependency parser which we show give...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.